audit: type=1800 audit(1677358366.679:9): pid=9821 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="loop4" ino=3 res=0 ============================================ WARNING: possible recursive locking detected 4.14.307-syzkaller #0 Not tainted -------------------------------------------- syz-executor.0/9837 is trying to acquire lock: (&HFSPLUS_I(inode)->extents_lock){+.+.}, at: [] hfsplus_get_block+0x1f9/0x820 fs/hfsplus/extents.c:260 but task is already holding lock: (&HFSPLUS_I(inode)->extents_lock){+.+.}, at: [] hfsplus_file_extend+0x188/0xef0 fs/hfsplus/extents.c:452 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(&HFSPLUS_I(inode)->extents_lock); lock(&HFSPLUS_I(inode)->extents_lock); *** DEADLOCK *** May be due to missing lock nesting notation 5 locks held by syz-executor.0/9837: #0: (&type->s_umount_key#56/1){+.+.}, at: [] alloc_super fs/super.c:251 [inline] #0: (&type->s_umount_key#56/1){+.+.}, at: [] sget_userns+0x556/0xc10 fs/super.c:516 #1: (&sbi->vh_mutex){+.+.}, at: [] hfsplus_fill_super+0x1314/0x1850 fs/hfsplus/super.c:553 #2: (&tree->tree_lock){+.+.}, at: [] hfsplus_find_init+0x1a8/0x220 fs/hfsplus/bfind.c:30 #3: (&HFSPLUS_I(inode)->extents_lock){+.+.}, at: [] hfsplus_file_extend+0x188/0xef0 fs/hfsplus/extents.c:452 #4: (&sbi->alloc_mutex){+.+.}, at: [] hfsplus_block_allocate+0xd2/0x910 fs/hfsplus/bitmap.c:35 stack backtrace: CPU: 1 PID: 9837 Comm: syz-executor.0 Not tainted 4.14.307-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 print_deadlock_bug kernel/locking/lockdep.c:1800 [inline] check_deadlock kernel/locking/lockdep.c:1847 [inline] validate_chain kernel/locking/lockdep.c:2448 [inline] __lock_acquire.cold+0x180/0x97c kernel/locking/lockdep.c:3491 lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0xc4/0x1310 kernel/locking/mutex.c:893 hfsplus_get_block+0x1f9/0x820 fs/hfsplus/extents.c:260 block_read_full_page+0x25e/0x8d0 fs/buffer.c:2316 do_read_cache_page+0x38e/0xc10 mm/filemap.c:2713 read_mapping_page include/linux/pagemap.h:398 [inline] hfsplus_block_allocate+0x189/0x910 fs/hfsplus/bitmap.c:37 hfsplus_file_extend+0x421/0xef0 fs/hfsplus/extents.c:463 hfsplus_bmap_reserve+0x26e/0x410 fs/hfsplus/btree.c:357 hfsplus_create_cat+0x1af/0x10d0 fs/hfsplus/catalog.c:272 hfsplus_fill_super+0x1386/0x1850 fs/hfsplus/super.c:560 mount_bdev+0x2b3/0x360 fs/super.c:1134 mount_fs+0x92/0x2a0 fs/super.c:1237 vfs_kern_mount.part.0+0x5b/0x470 fs/namespace.c:1046 vfs_kern_mount fs/namespace.c:1036 [inline] do_new_mount fs/namespace.c:2572 [inline] do_mount+0xe65/0x2a30 fs/namespace.c:2905 SYSC_mount fs/namespace.c:3121 [inline] SyS_mount+0xa8/0x120 fs/namespace.c:3098 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x5e/0xd3 RIP: 0033:0x7fab607f862a RSP: 002b:00007fab5ed68f88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 000000000000061b RCX: 00007fab607f862a RDX: 0000000020000600 RSI: 00000000200001c0 RDI: 00007fab5ed68fe0 RBP: 00007fab5ed69020 R08: 00007fab5ed69020 R09: 0000000001a00010 R10: 0000000001a00010 R11: 0000000000000202 R12: 0000000020000600 R13: 00000000200001c0 R14: 00007fab5ed68fe0 R15: 0000000020000140 ISO 9660 Extensions: Microsoft Joliet Level 0 rock: corrupted directory entry. extent=32, offset=2044, size=237 VFS: Found a Xenix FS (block size = 512) on device loop2 sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size audit: type=1800 audit(1677358367.589:10): pid=9864 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="loop4" ino=4 res=0 sysv_free_block: flc_count > flc_size ISO 9660 Extensions: Microsoft Joliet Level 0 rock: corrupted directory entry. extent=32, offset=2044, size=237 sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size ntfs: volume version 3.1. audit: type=1800 audit(1677358367.879:11): pid=9911 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="loop4" ino=5 res=0 VFS: Found a Xenix FS (block size = 512) on device loop2 sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size VFS: Found a Xenix FS (block size = 512) on device loop5 sysv_free_block: flc_count > flc_size audit: type=1800 audit(1677358368.059:12): pid=9948 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="bus" dev="loop4" ino=6 res=0 sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size block nbd3: shutting down sockets sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size block nbd0: shutting down sockets VFS: Found a Xenix FS (block size = 512) on device loop2 block nbd4: shutting down sockets sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size VFS: Found a Xenix FS (block size = 512) on device loop5 sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size VFS: Found a Xenix FS (block size = 512) on device loop5 sysv_free_block: flc_count > flc_size VFS: Found a Xenix FS (block size = 512) on device loop2 sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size sysv_free_block: flc_count > flc_size ====================================================== WARNING: the mand mount option is being deprecated and will be removed in v5.15! ====================================================== XFS (loop4): Mounting V4 Filesystem XFS (loop4): Ending clean mount XFS (loop4): Unmounting Filesystem XFS (loop4): Mounting V4 Filesystem XFS (loop4): Ending clean mount XFS (loop4): Unmounting Filesystem XFS (loop4): Mounting V4 Filesystem XFS (loop4): Ending clean mount XFS (loop4): Unmounting Filesystem audit: type=1804 audit(1677358372.829:13): pid=10318 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir737890239/syzkaller.gNnJif/37/file0/bus" dev="loop0" ino=7 res=1 audit: type=1804 audit(1677358372.839:14): pid=10318 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir737890239/syzkaller.gNnJif/37/file0/bus" dev="loop0" ino=7 res=1 audit: type=1804 audit(1677358372.919:15): pid=10318 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir737890239/syzkaller.gNnJif/37/file0/bus" dev="loop0" ino=7 res=1 audit: type=1804 audit(1677358372.919:16): pid=10318 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir737890239/syzkaller.gNnJif/37/file0/bus" dev="loop0" ino=7 res=1 XFS (loop4): Mounting V4 Filesystem XFS (loop4): Ending clean mount XFS (loop4): Unmounting Filesystem netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. device bridge_slave_1 left promiscuous mode bridge0: port 2(bridge_slave_1) entered disabled state bridge1: port 1(bridge_slave_1) entered blocking state bridge1: port 1(bridge_slave_1) entered disabled state device bridge_slave_1 entered promiscuous mode netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. device bridge_slave_1 left promiscuous mode bridge1: port 1(bridge_slave_1) entered disabled state bridge2: port 1(bridge_slave_1) entered blocking state bridge2: port 1(bridge_slave_1) entered disabled state device bridge_slave_1 entered promiscuous mode audit: type=1804 audit(1677358375.009:17): pid=10386 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir737890239/syzkaller.gNnJif/38/file0/bus" dev="loop0" ino=7 res=1 netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. device bridge_slave_1 left promiscuous mode bridge2: port 1(bridge_slave_1) entered disabled state audit: type=1804 audit(1677358375.019:18): pid=10386 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir737890239/syzkaller.gNnJif/38/file0/bus" dev="loop0" ino=7 res=1 bridge3: port 1(bridge_slave_1) entered blocking state bridge3: port 1(bridge_slave_1) entered disabled state device bridge_slave_1 entered promiscuous mode audit: type=1804 audit(1677358375.089:19): pid=10468 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir737890239/syzkaller.gNnJif/38/file0/bus" dev="loop0" ino=7 res=1 netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. device bridge_slave_1 left promiscuous mode audit: type=1804 audit(1677358375.099:20): pid=10468 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir737890239/syzkaller.gNnJif/38/file0/bus" dev="loop0" ino=7 res=1